General
-
Target
test.bat
-
Size
370B
-
Sample
230523-qxc8fsgd2w
-
MD5
1157be1803e2f740eec3a0c69aa44625
-
SHA1
5963efa7895a6748e74f0aeb94a3b3856787b8c5
-
SHA256
42c77f89ea1a298098ecf3e8939f6c5ccd005742d0482047ee26fbf56728c684
-
SHA512
04d698560789eb87f9fdbc32468557d05655558d289749f263fba4cdeb26b1cf83c214c316d60184856a935a9da757a62c361ca8e41804b59606a068a18f3899
Static task
static1
Behavioral task
behavioral1
Sample
test.bat
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
test.bat
-
Size
370B
-
MD5
1157be1803e2f740eec3a0c69aa44625
-
SHA1
5963efa7895a6748e74f0aeb94a3b3856787b8c5
-
SHA256
42c77f89ea1a298098ecf3e8939f6c5ccd005742d0482047ee26fbf56728c684
-
SHA512
04d698560789eb87f9fdbc32468557d05655558d289749f263fba4cdeb26b1cf83c214c316d60184856a935a9da757a62c361ca8e41804b59606a068a18f3899
Score8/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-